Analysis

  • max time kernel
    70s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 02:15

General

  • Target

    https://rotationalmouldingmachines.in/images/unipay/www/?i=i&0=JackyChan@gmail.com

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand google.
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://rotationalmouldingmachines.in/images/unipay/www/?i=i&0=JackyChan@gmail.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3376
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3376 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4224

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    2385a464e17980d978246b6b59a60697

    SHA1

    ee57c16c00972abbea042066dbdd769fdb89571b

    SHA256

    88dabd9b9c2183dd69b01146358783b0dc0e24faf044331be565cfd26e1dee2a

    SHA512

    d85eaa2a9a0a4523eb87bd43bbe995d8658dce705024c316de12c9f9be0277ded1646a6667bd47eed337e2b790aab9760ddf2e501242c42f3d66f40c23042d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    71538fb8b648fa0f1f5cfc7f3703cfb0

    SHA1

    9ea5945bd0d2c9bb64072b67a83c30d05bb71cb2

    SHA256

    2ee4e635f107b668e9f22c40aac966fda88d8a111ca63d8ddf7044e1b46140cc

    SHA512

    d84e4e9825d03efc9f13e3da1d81f046261807a4a2682e221405eb7c5986eb13768a069443f1990e71b7410854bb2454558f0d834c923dc5d89c2428f9d0bafb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat
    Filesize

    167KB

    MD5

    b157bfc0186d4cfbc51ff293a1cc19a5

    SHA1

    d2f249a978c149ff9154d45678ffe6eccc58c530

    SHA256

    2ffd8f9cd32cc8ac8eb7b9ff7a1f908722bbb4165d42b51a051b88c66b13210f

    SHA512

    edc7c8ce284a2556f1e0222aff49b2c6515dfdaa574bcb8f3b8576e769ccf3fc9b7516267cea0ef31b8c59851bb165334b44317df7262607b51f5f85724c16e2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBR7CLLA\gm[1].ico
    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563